WO2012129851A1 - 一种移动终端及其锁网的方法 - Google Patents

一种移动终端及其锁网的方法 Download PDF

Info

Publication number
WO2012129851A1
WO2012129851A1 PCT/CN2011/076012 CN2011076012W WO2012129851A1 WO 2012129851 A1 WO2012129851 A1 WO 2012129851A1 CN 2011076012 W CN2011076012 W CN 2011076012W WO 2012129851 A1 WO2012129851 A1 WO 2012129851A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
information
chip
sim card
customized information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2011/076012
Other languages
English (en)
French (fr)
Inventor
姚晓峰
林华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to US13/985,577 priority Critical patent/US20140018131A1/en
Priority to EP11862010.3A priority patent/EP2665300B1/en
Priority to JP2013553766A priority patent/JP5722464B2/ja
Publication of WO2012129851A1 publication Critical patent/WO2012129851A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to mobile communication technologies, and in particular, to a mobile terminal and a method for locking the same. Background technique
  • the main object of the present invention is to provide a mobile terminal and a method for locking the same, which can implement a flexible lock network of the mobile terminal.
  • the invention provides a method for locking a network of a mobile terminal, wherein the mobile terminal has a built-in encryption chip, and the user identification card (SIM, Subscriber Identity Module), the encryption chip and the mobile terminal main chip respectively store customized information; After the mobile terminal is powered on, the encryption chip and the mobile terminal main chip and the SIM card respectively compare the customized information, and after any comparison is inconsistent, the communication between the mobile terminal main chip and the SIM card is blocked.
  • SIM Subscriber Identity Module
  • the customized information is carrier information or carrier information and partner information.
  • the storing the customized information in the SIM card is: when the customized information is the operator information, writing the operator information in the group identification file 1 (GID1) of the SIM card; when the customized information is When the operator information and the partner information are written, the operator information is written in the GID1 file of the SIM card, and the partner information is written in the group identification file 2 (GID2) of the SIM card.
  • GID1 group identification file 1
  • GID2 group identification file 2
  • the encryption chip and the mobile terminal main chip compare the customized information to: the encryption chip sends an information acquisition signal to the mobile terminal main chip, and requests to obtain customized information;
  • the mobile terminal main chip After receiving the information acquisition signal, the mobile terminal main chip sends the customized information in its own software security area to the encryption chip;
  • the encryption chip compares the customized information from the mobile terminal main chip and the customized information stored by itself to prevent communication between the mobile terminal main chip and the SIM card when they are inconsistent.
  • the method further includes: the encryption chip comparing the customized information from the mobile terminal main chip and the customized information stored by the encryption chip to the mobile terminal main chip to send a software verification success signal;
  • the mobile terminal main chip After receiving the software verification success signal, the mobile terminal main chip sends an information acquisition signal to the encryption chip, requesting to acquire customized information in the encryption chip;
  • the encryption chip After receiving the information acquisition signal of the mobile terminal main chip, the encryption chip sends the stored customized information to the mobile terminal main chip;
  • the mobile terminal main chip compares the customized information from the encryption chip with the customized information in the security area of the software itself, and when the mobile chip masters, the mobile terminal main chip notifies the encryption chip that the hardware verification is successful. After receiving the notification that the hardware verification is successful, the encryption chip performs the step of comparing the encryption chip and the SIM card to the customized information; when the inconsistency, notifying the hardware verification failure of the encryption chip, the encryption chip receives the notification that the hardware verification fails. After that, the communication between the mobile terminal main chip and the SIM card is blocked.
  • the encryption chip and the SIM card compare the customized information to:
  • the encryption chip sends a message acquisition signal to the SIM card, requesting to obtain customized information in the SIM card;
  • the SIM card After receiving the information acquisition signal, the SIM card sends the customized information stored by itself to the encryption chip;
  • the encryption chip compares the customized information from the SIM card with the customized information stored by itself, and prevents communication between the mobile terminal main chip and the SIM card when they are inconsistent.
  • the preventing communication between the mobile terminal main chip and the SIM card is: the encryption chip of the mobile terminal intercepts communication information between the mobile terminal main chip and the SIM card, and interrupts the mobile terminal main chip and the SIM card. Normal communication between.
  • the mobile terminal provided by the present invention includes: an encryption chip, a mobile terminal main chip, and a SIM card module;
  • the encryption chip stores therein customized information, and is used to compare the customized information with the mobile terminal main chip and the SIM card module after the mobile terminal is powered on, and prevents the mobile terminal between the main chip and the SIM card module after any comparison is inconsistent. Communication;
  • a mobile terminal main chip in which customized information is stored, which is used for providing self-customized information to the encryption chip for comparison;
  • the SIM card module is configured to read the customized information in the SIM card and provide the customized information to the encryption chip.
  • the encryption chip is specifically configured to intercept communication information between the mobile terminal main chip and the SIM card module after any comparison is inconsistent, interrupting the mobile terminal main chip and Normal communication between SIM card modules.
  • the invention provides a mobile terminal and a method for locking the same.
  • the mobile terminal has a built-in encryption chip, and stores customized information on the SIM card, the encryption chip and the mobile terminal main chip respectively. After the mobile terminal is powered on, the encryption chip and the mobile terminal are respectively The chip and the SIM card respectively compare the customized information, and after any comparison is inconsistent, the communication between the mobile terminal main chip and the SIM card is blocked.
  • the flexible lock network of the mobile terminal is realized, and in the case that the customized information is the operator information or the operator information and the partner information, any service that can be provided by the same operator or the same operator and partner Under the network, the mobile terminal can be used normally after inserting the SIM card customized by the operator, which avoids the problem that the mobile terminal must return to the manufacturer to re-lock the network when the operator crosses the network within the operator, thereby improving efficiency and reducing the efficiency.
  • the cost At the same time, the scheme of the present invention compares information by means of a combination of software and hardware, and effectively prevents various illegal cracking of the mobile terminal software.
  • FIG. 1 is a schematic flowchart of a method for implementing a network lock connection of a mobile terminal according to the present invention
  • FIG. 2 is a schematic structural diagram of a mobile terminal implemented by the present invention. detailed description
  • the basic idea of the present invention is: a built-in encryption chip is installed in the mobile terminal, and the customized information is stored in the SIM card, the encryption chip and the mobile terminal main chip respectively; after the mobile terminal is powered on, the encryption chip and the mobile terminal main chip and the SIM card are respectively compared.
  • the customized information prevents communication between the mobile terminal main chip and the SIM card after any one of the comparisons is inconsistent.
  • the invention provides a method for a mobile terminal lock operator, as shown in FIG. 1, the method includes the following steps:
  • Step 101 The mobile terminal is built in to filter the communication between the mobile terminal main chip and the SIM card.
  • the encryption chip stores the customized information in the SIM card, the encryption chip and the mobile terminal software respectively; specifically, an encryption chip is added in the mobile terminal, and is serially connected between the mobile terminal main chip and the SIM card, and is used for filtering the mobile terminal.
  • Communication information between the main chip and the SIM card, and the customization information is written in advance in the software security areas of the SIM card, the encryption chip, and the mobile terminal main chip; the customized information may be carrier information or carrier information and partner information.
  • the operator information generally includes: an operator name, an operator code, and the like;
  • the partner information is vendor information that is signed with the operator, and generally includes: a partner name, a partner code, and the like;
  • the card writes the customized information, which may be: when the customized information is the operator information, the operator information is written in the GID1 file of the SIM card; when the customized information is the operator information and the partner information, the GID1 file of the SIM card is written. Enter the carrier information, and write the partner information in the GID2 file of the SIM card;
  • the encryption chip filters the communication information between the main chip of the mobile terminal and the SIM card, and generally: the encryption chip automatically runs after each booting, and only acquires preset information between the mobile terminal main chip and the SIM card. The remaining information is transparently transmitted.
  • the preset information is generally an interaction signal about a customized message; the information in the encryption chip can only be written, modified, erased, etc. by the mobile terminal manufacturer.
  • Step 102 After the mobile terminal is powered on, the encryption chip and the mobile terminal main chip compare the customized information, when they are consistent, perform step 103; when they are inconsistent, perform step 105;
  • the encryption chip sends an information acquisition signal to the mobile terminal main chip to request to obtain customized information; after receiving the information acquisition signal, the mobile terminal main chip sends the customized information in the software security area.
  • the encryption chip compares the customized information sent by the mobile terminal main chip with the customized information stored by itself, and sends a software verification success signal S to the mobile terminal main chip when the data is consistent, indicating that the hardware verification of the software is successful. Step 103 is performed; when it is inconsistent, step 105 is performed;
  • the encryption chip When the customized information is carrier information and partner information, the encryption chip will be a mobile terminal
  • the customized information sent by the main chip is compared with the customized information stored by the main chip, and specifically: the encryption chip first compares the carrier information sent by the mobile terminal main chip with the carrier information stored by itself, when the same And comparing the partner information sent by the mobile terminal main chip with the cooperation party information stored by itself;
  • the mobile terminal main chip further includes: the mobile terminal main chip sends an information acquisition signal to the encryption chip, requesting to acquire the customized information in the encryption chip; the encryption chip is received After the information acquisition signal of the mobile terminal main chip is sent, the stored customized information is sent to the mobile terminal main chip; the mobile terminal main chip compares the customized information sent by the encryption chip with the customized information in the security area of the software, when the same Informing the encryption chip that the hardware verification is successful, indicating that the verification of the hardware by the software is successful. After receiving the notification of successful hardware verification, the encryption chip performs step 103; when it is inconsistent, notifying the encryption chip that the hardware verification fails, the encryption chip receives the hardware.
  • step 105 is performed; further, in this step, if the mobile terminal software in the mobile terminal main chip is cracked or erased, and the encryption chip fails to receive the customized information returned by the mobile terminal main chip within the specified time, Go to step 105.
  • the combination of software and hardware is used to compare the customized information, which effectively prevents various illegal cracking of the mobile terminal software.
  • Step 103 The encryption chip of the mobile terminal and the SIM card compare the customized information, when they are consistent, perform step 104; when they are inconsistent, perform step 105;
  • the encryption chip automatically sends an information acquisition signal to the SIM card to request the customized information in the SIM card; after receiving the information acquisition signal, the SIM card stores the customized information stored by itself. Sending to the encryption chip; the encryption chip compares the customized information sent by the SIM card with the customized information stored by itself, and when yes, sends a comparison success signal to the SIM card, step 104 is performed; when not, step 105 is performed;
  • the encryption chip sends the SIM card
  • the customized information is compared with the customized information stored by itself, specifically: the encryption chip compares the carrier information sent by the SIM card with the carrier information stored by itself, and when the card is consistent, the SIM card is used again.
  • the partner information sent is compared with the partner letter stored by itself.
  • Step 104 The normal communication between the mobile terminal main chip and the SIM card ends, and the process ends.
  • the encryption chip transparently transmits the communication information between the mobile terminal main chip and the SIM card.
  • Step 105 Block communication between the mobile terminal main chip and the SIM card;
  • the encryption chip serially connected between the mobile terminal main chip and the SIM card intercepts communication information between the mobile terminal main chip and the SIM card, and interrupts normal communication between the mobile terminal main chip and the SIM card.
  • the present invention further provides a mobile terminal.
  • the mobile terminal includes: an encryption chip 21, a mobile terminal main chip 22, and a SIM card module 23; wherein, the encryption chip 21 stores therein customization
  • the information is used to filter the communication information between the mobile terminal main chip 22 and the SIM card module 23 after the mobile terminal is powered on; compare the customized information with the mobile terminal main chip 22 and the SIM card module 23, respectively, at any time. After the inconsistency, the communication between the mobile terminal main chip 22 and the SIM card module 23 is blocked;
  • the mobile terminal main chip 22 stores therein customized information for providing the encryption chip 21 with customized information for comparison;
  • the SIM card module 23 is configured to read the customized information in the SIM card, and provide the customized information to the encryption chip 21;
  • the customized information may be carrier information or carrier information and partner information. Further, when the customized information is carrier information, the customized information in the SIM card is: writing and operating a GID1 file of the SIM card. When the customized information is the operator information and the partner information, the customized information in the SIM card is: the operator information is written in the GID1 file of the SIM card, and the partner information is written in the GID2 file.
  • the encryption chip 21 is specifically configured to send an information acquisition signal to the mobile terminal after each power-on. End main chip 22, requesting to acquire customized information; after receiving the customized information from the mobile terminal main chip 22, comparing the customized information from the mobile terminal main chip 22 and the customized information stored by itself, in the event of inconsistency, blocking the mobile terminal main
  • the customized information of the card after receiving the customized information sent by the SIM card module 23, comparing the customized information from the SIM card module 23 with the customized information stored by itself, in the event of inconsistency, blocking the mobile terminal main chip 22 and the SIM card module 23 communication; when the message is consistent, the comparison success signal is sent to the SIM card module 23, and the communication information between the mobile terminal main chip 22 and the SIM card module 23 is transparently transmitted to enable the mobile terminal to communicate normally;
  • the encryption chip 21 blocks communication between the mobile terminal main chip 22 and the SIM card module 23, specifically: the encryption chip 21 intercepts communication information between the mobile terminal main chip 22 and the SIM card module 23, and interrupts the mobile terminal. Normal communication between the main chip 22 and the SIM card module 23; the mobile terminal main chip 22 is specifically configured to send the customized information in the software security area to the encryption chip after receiving the information acquisition signal sent by the encryption chip 21 21, and receiving the software verification success signal S of the encryption chip 21;
  • the SIM card module 23 is specifically configured to: after receiving the information acquisition signal sent by the encryption chip 21, read the customized information stored by the SIM card, and send the information to the encryption chip 21 to receive the comparison success signal of the encryption chip 21;
  • the mobile terminal main chip 22 is further configured to: after receiving the software verification success signal S, send an information acquisition signal to the encryption chip 21, requesting to acquire customized information in the encryption chip 21; receiving the customization sent by the encryption chip 21 After the information, the customization information from the encryption chip 21 and the customization information in the security area of the mobile terminal software are compared, and when the data is consistent, the hardware verification of the encryption chip 21 is notified to be successful; when the data is inconsistent, the hardware verification failure of the encryption chip 21 is notified;
  • the encryption chip 21 is further used for receiving an information acquisition signal of the mobile terminal main chip 22 After the number is sent, the stored customized information is sent to the mobile terminal main chip 22, and after receiving the notification of successful hardware verification sent by the mobile terminal main chip 22, the customized information is compared with the SIM card module 23; After the notification of the hardware verification failure sent by the mobile terminal main chip 22, the customization information is not compared with the SIM card module 23, and communication between the mobile terminal main chip 22 and the SIM card module 23 is blocked.
  • the flexible lock network of the mobile terminal can be realized, and in the case where the customized information is the operator information or the operator information and the partner information, any service that can be provided by the same operator or the same operator and partner can be provided.
  • the mobile terminal Under the network, the mobile terminal can be used normally after inserting the customized SIM card of the operator, which avoids the problem that the mobile terminal must return to the manufacturer to re-lock the network after inter-network intermodulation within the operator, thereby improving efficiency and reducing the efficiency. cost.
  • the combination of software and hardware for information comparison can effectively prevent various illegal cracking of mobile terminal software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种移动终端锁网的方法,移动终端内置加密芯片,在用户身份识别卡(SIM)、加密芯片和移动终端主芯片分别存储定制信息;移动终端开机后,加密芯片与移动终端主芯片和SIM卡分别比对所述定制信息,在任意一次比对不一致后,阻止移动终端主芯片和SIM卡间的通信;本发明同时还公开了一种移动终端,通过本发明的方案,能够实现移动终端的灵活锁网,并在定制信息为运营商信息或运营商信息和合作方信息的情况下,在同一运营商或同一运营商和合作方所能提供服务的任何网络下,移动终端只要插入该运营商定制的SIM卡后都能正常使用,避免移动终端在该运营商内部跨网络互调必须返回生产厂商处重新锁网的问题。

Description

一种移动终端及其锁网的方法 技术领域
本发明涉及移动通信技术, 尤其涉及一种移动终端及其锁网的方法。 背景技术
手机作为当前最常用的移动终端的发展与普及, 越来越影响到人们的 信息交流方式, 使得手机已经成为人们日常生活和工作中不可或缺的一部 分。 目前, 大多数的手机生产厂家, 釆用与运营商合作定制的方式来获取 利润, 而运营商为了保护自己的合法权益, 一般要求对定制的手机进行锁 网, 即锁定某些特定的网络, 使得用户只能使用该运营商的服务, 以保护 自己的利益。 随着国际化经济的发展, 现在很多大型运营商所提供的服务, 都能覆盖多个网络。 如果某个运营商需要定制一批手机分别销往不同的网 络覆盖处, 那么, 手机生产厂商在发货前, 必须分别对销往各地的手机进 行不同网络的锁网操作, 这样做不仅效率太低, 而且, 锁网后的手机只能 在特定网络下使用, 如果运营商需要在内部跨网络互调, 则必须返回生产 厂商处重新锁网, 成本太高。 发明内容
有鉴于此, 本发明的主要目的在于提供一种移动终端及其锁网的方法, 能够实现移动终端的灵活锁网。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供的一种移动终端锁网的方法, 移动终端内置加密芯片, 在 用户身份识别卡 (SIM, Subscriber Identity Module ), 加密芯片和移动终端 主芯片分别存储定制信息; 移动终端开机后, 所述加密芯片与移动终端主芯片和 SIM卡分别比对 所述定制信息, 在任意一次比对不一致后, 阻止所述移动终端主芯片和所 述 SIM卡间的通信。
上述方案中, 所述定制信息为运营商信息或运营商信息和合作方信息。 上述方案中, 所述在 SIM卡存储定制信息为: 当所述定制信息为运营 商信息时, 在所述 SIM卡的分组识别文件 1 ( GID1 )写入运营商信息; 当所述定制信息为运营商信息和合作方信息时,在所述 SIM卡的 GID1 文件写入运营商信息, 在 SIM卡的分组识别文件 2 ( GID2 ) 写入合作方信 息。
上述方案中, 所述加密芯片和移动终端主芯片比对所述定制信息为: 所述加密芯片发送信息获取信号到移动终端主芯片, 请求获取定制信 息;
所述移动终端主芯片在收到信息获取信号后, 将自身软件安全区域内 的定制信息发送到加密芯片;
所述加密芯片比对来自移动终端主芯片的定制信息和自身存储的定制 信息, 在不一致时, 阻止所述移动终端主芯片和所述 SIM卡间的通信。
上述方案中, 该方法进一步包括: 所述加密芯片比对来自移动终端主 芯片的定制信息和自身存储的定制信息, 在一致时, 向所述移动终端主芯 片发送软件验证成功信号;
所述移动终端主芯片在接收到软件验证成功信号之后, 向加密芯片发 送信息获取信号, 请求获取加密芯片内的定制信息;
所述加密芯片在收到移动终端主芯片的信息获取信号后, 将存储的定 制信息发送到移动终端主芯片;
所述移动终端主芯片比对来自加密芯片的定制信息和自身软件安全区 域内的定制信息, 在一致时, 移动终端主芯片通知加密芯片硬件验证成功, 所述加密芯片接收到硬件验证成功的通知后, 执行加密芯片和 SIM卡比对 所述定制信息的步骤; 在不一致时, 通知加密芯片硬件验证失败, 所述加 密芯片接收到硬件验证失败的通知后, 阻止移动终端主芯片和 SIM卡间的 通信。
上述方案中, 所述加密芯片和 SIM卡比对所述定制信息为:
所述移动终端在有 SIM卡插入时, 所述加密芯片向 SIM卡发送信息获 取信号, 请求获取 SIM卡内的定制信息;
所述 SIM卡在收到所述信息获取信号后 , 将自身存储的定制信息发送 到加密芯片;
所述加密芯片比对来自 SIM卡的定制信息和自身存储的定制信息, 在 不一致时, 阻止所述移动终端主芯片和所述 SIM卡间的通信。
上述方案中, 所述阻止所述移动终端主芯片和所述 SIM卡间的通信, 为: 移动终端的加密芯片截获移动终端主芯片和 SIM卡间的通信信息, 中 断移动终端主芯片和 SIM卡间的正常通信。
本发明提供的一种移动终端, 该移动终端包括: 加密芯片、 移动终端 主芯片、 SIM卡模块; 其中,
加密芯片, 其中存储有定制信息, 用于在移动终端开机后, 分别与移 动终端主芯片和 SIM卡模块比对定制信息, 在任意一次比对不一致后, 阻 止移动终端主芯片和 SIM卡模块间的通信;
移动终端主芯片, 其中存储有定制信息, 用于向加密芯片提供自身的 定制信息进行比对;
SIM卡模块, 用于读取 SIM卡中的定制信息, 并向加密芯片提供所述 定制信息。
上述方案中, 所述加密芯片, 具体用于在任意一次比对不一致后, 截 获移动终端主芯片和 SIM 卡模块间的通信信息, 中断移动终端主芯片和 SIM卡模块间的正常通信。
本发明提供了一种移动终端及其锁网的方法, 移动终端内置加密芯片, 在 SIM卡、 加密芯片和移动终端主芯片分别存储定制信息; 移动终端开机 后, 所述加密芯片与移动终端主芯片和 SIM卡分别比对所述定制信息, 在 任意一次比对不一致后,阻止所述移动终端主芯片和所述 SIM卡间的通信。 通过本发明, 实现了移动终端的灵活锁网, 并在定制信息为运营商信息或 运营商信息和合作方信息的情况下, 在同一运营商或同一运营商和合作方 所能提供服务的任何网络下, 移动终端只要插入该运营商定制的 SIM卡后 都能正常使用, 避免了移动终端在该运营商内部跨网络互调时必须返回生 产厂商处重新锁网的问题, 提高了效率, 降低了成本。 同时, 本发明的方 案釆用软硬件结合的方法进行信息的互相比对, 有效地防止了对移动终端 软件的各种非法破解。 附图说明
图 1为本发明实现移动终端锁网的方法的流程示意图;
图 2为本发明实现的移动终端的结构示意图。 具体实施方式
本发明的基本思想是: 移动终端内置加密芯片, 在 SIM卡、 加密芯片 和移动终端主芯片分别存储定制信息; 移动终端开机后, 所述加密芯片与 移动终端主芯片和 SIM卡分别比对所述定制信息, 在任意一次比对不一致 后, 阻止所述移动终端主芯片和所述 SIM卡间的通信。
下面通过附图及具体实施例对本发明做进一步的详细说明。
本发明提供的一种移动终端锁运营商的方法, 如图 1 所示, 该方法包 括以下几个步骤:
步骤 101 : 移动终端内置用于过滤移动终端主芯片和 SIM卡间通信信 息的加密芯片, 在 SIM卡、 加密芯片和移动终端软件分别存储定制信息; 具体的, 在移动终端中增加一个加密芯片, 串接在移动终端主芯片和 SIM卡之间, 用于过滤移动终端主芯片和 SIM卡间的通信信息, 并预先在 SIM卡、 加密芯片和移动终端主芯片的软件安全区域分别写入定制信息; 所述定制信息可以为运营商信息或运营商信息和合作方信息; 所述运 营商信息一般包括: 运营商名称、 运营商代号等; 所述合作方信息为与运 营商签订合作关系的厂商信息, 一般包括: 合作方名称、 合作方代号等; 所述在 SIM卡写入定制信息, 可以是: 当定制信息为运营商信息时, 在 SIM卡的 GID1文件写入运营商信息; 当定制信息为运营商信息和合作 方信息时, 在 SIM卡的 GID1文件写入运营商信息, 在 SIM卡的 GID2文 件写入合作方信息;
所述加密芯片过滤移动终端主芯片和 SIM卡间的通信信息, 一般是: 所述加密芯片在每次开机后自动运行, 只对移动终端主芯片和 SIM卡间预 先设定的信息进行获取, 其余信息透传, 这里, 所述预先设定的信息一般 为关于定制消息的交互信号; 所述加密芯片中的信息只有移动终端厂商才 能进行写入、 修改、 擦除等操作。
步骤 102: 移动终端开机后,加密芯片和移动终端主芯片比对所述定制 信息, 在一致时, 执行步骤 103; 在不一致时, 执行步骤 105;
具体的, 所述移动终端每次开机后, 加密芯片发送信息获取信号到移 动终端主芯片, 请求获取定制信息; 移动终端主芯片在收到信息获取信号 后, 将软件安全区域内的定制信息发送到加密芯片; 加密芯片将移动终端 主芯片发来的定制信息和自身存储的定制信息进行比对, 在一致时, 向移 动终端主芯片发送软件验证成功信号 S ,表示硬件对软件的验证成功,执行 步骤 103; 在不一致时, 执行步骤 105;
在定制信息为运营商信息和合作方信息时, 所述加密芯片将移动终端 主芯片发来的定制信息和自身存储的定制信息进行比对, 具体为: 所述加 密芯片先将移动终端主芯片发来的运营商信息与自身存储的运营商信息进 行比对, 在一致时, 再将移动终端主芯片发来的合作方信息与自身存储的 合作方信进行比对;
进一步的, 所述移动终端主芯片在接收到软件验证成功信号 S之后, 本步骤还包括: 移动终端主芯片向加密芯片发送信息获取信号, 请求获取 加密芯片内的定制信息; 加密芯片在收到移动终端主芯片的信息获取信号 后, 将存储的定制信息发送到移动终端主芯片; 移动终端主芯片将加密芯 片发来的定制信息和自身软件安全区域内的定制信息进行比对, 在一致时, 通知加密芯片硬件验证成功, 表示软件对硬件的验证成功, 所述加密芯片 接收到硬件验证成功的通知后执行步骤 103; 在不一致时, 通知加密芯片硬 件验证失败, 所述加密芯片接收到硬件验证失败的通知后执行步骤 105; 进一步的, 本步骤中, 如果移动终端主芯片中移动终端软件被破解或 擦除, 加密芯片在指定的时间内收不到移动终端主芯片返回的定制信息时, 执行步骤 105。
通过本步骤的方法, 釆用软硬件结合进行定制信息的互相比对, 有效 防止了对移动终端软件的各种非法破解。
步骤 103: 移动终端的加密芯片和 SIM卡比对所述定制信息, 在一致 时, 执行步骤 104; 在不一致时, 执行步骤 105;
具体的, 移动终端在有 SIM卡插入时, 加密芯片自动向 SIM卡发送信 息获取信号, 请求获取 SIM卡内的定制信息; SIM卡在收到所述信息获取 信号后, 将自身存储的定制信息发送到加密芯片; 加密芯片将 SIM卡发来 的定制信息和自身存储的定制信息进行比对, 在一致时, 向 SIM卡发送比 对成功信号, 执行步骤 104; 在不一致时, 执行步骤 105;
在定制信息为运营商信息和合作方信息时, 所述加密芯片将 SIM卡发 来的定制信息和自身存储的定制信息进行比对, 具体为: 所述加密芯片先 将 SIM卡发来的运营商信息与自身存储的运营商信息进行比对,在一致时, 再将 SIM卡发来的合作方信息与自身存储的合作方信进行比对。
步骤 104: 移动终端主芯片和 SIM卡间正常通信, 流程结束; 这里, 所述加密芯片透传移动终端主芯片和 SIM卡间的通信信息。 步骤 105: 阻止移动终端主芯片和 SIM卡间的通信;
具体的, 串接在移动终端主芯片和 SIM卡之间的加密芯片截获移动终 端主芯片和 SIM卡间的通信信息, 中断移动终端主芯片和 SIM卡间的正常 通信。
为了实现上述方法, 本发明还提供一种移动终端, 如图 2所示, 该移 动终端包括: 加密芯片 21、 移动终端主芯片 22、 SIM卡模块 23; 其中, 加密芯片 21 , 其中存储有定制信息, 用于在移动终端开机后, 过滤移 动终端主芯片 22和 SIM卡模块 23间的通信信息; 分别与移动终端主芯片 22和 SIM卡模块 23比对所述定制信息, 在任意一次比对不一致后, 阻止 移动终端主芯片 22和 SIM卡模块 23间的通信;
移动终端主芯片 22, 其中存储有定制信息, 用于向加密芯片 21提供自 身的定制信息进行比对;
SIM卡模块 23 , 用于读取 SIM卡中的定制信息, 并向加密芯片 21提 供所述定制信息;
所述定制信息可以为运营商信息或运营商信息和合作方信息; 进一步的, 所述定制信息为运营商信息时, 所述 SIM卡中的定制信息 为: 在 SIM卡的 GID1文件写入运营商信息; 所述定制信息为运营商信息 和合作方信息时, 所述 SIM卡中的定制信息为: 在 SIM卡的 GID1文件写 入运营商信息, 并在 GID2文件写入合作方信息。
所述加密芯片 21 , 具体用于每次开机后, 发送信息获取信号到移动终 端主芯片 22, 请求获取定制信息; 在接收到来自移动终端主芯片 22的定制 信息后, 比对来自移动终端主芯片 22的定制信息和自身存储的定制信息, 在不一致时, 阻止移动终端主芯片 22和 SIM卡模块 23间的通信; 在一致 时,向移动终端主芯片 22发送软件验证成功信号 S ,并在有 SIM卡插入时, 自动向 SIM卡模块 23发送信息获取信号, 请求获取 SIM卡的定制信息; 在接收到 SIM卡模块 23发来的定制信息后, 比对来自 SIM卡模块 23的定 制信息和自身存储的定制信息,在不一致时,阻止移动终端主芯片 22和 SIM 卡模块 23间的通信; 在一致时, 向 SIM卡模块 23发送比对成功信号, 透 传移动终端主芯片 22和 SIM卡模块 23间的通信信息, 使移动终端正常通 信;
进一步的, 所述加密芯片 21阻止移动终端主芯片 22和 SIM卡模块 23 间的通信, 具体为: 所述加密芯片 21截获移动终端主芯片 22和 SIM卡模 块 23间的通信信息,中断移动终端主芯片 22和 SIM卡模块 23的正常通信; 所述移动终端主芯片 22,具体用于在收到加密芯片 21发来的信息获取 信号后, 将自身软件安全区域内的定制信息发送到加密芯片 21 , 并接收加 密芯片 21的软件验证成功信号 S;
所述 SIM卡模块 23 , 具体用于在收到加密芯片 21发来的信息获取信 号后, 读取 SIM卡存储的定制信息, 并发送到加密芯片 21 , 接收加密芯片 21的比对成功信号;
所述移动终端主芯片 22, 进一步用于在接收到软件验证成功信号 S之 后, 向加密芯片 21发送信息获取信号, 请求获取加密芯片 21 内的定制信 息; 在接收到加密芯片 21发来的定制信息后, 比对来自加密芯片 21的定 制信息和自身移动终端软件的安全区域内的定制信息, 在一致时, 通知加 密芯片 21硬件验证成功; 在不一致时, 通知加密芯片 21硬件验证失败; 所述加密芯片 21 ,进一步用于在收到移动终端主芯片 22的信息获取信 号后, 将存储的定制信息发送到移动终端主芯片 22, 并在接收到移动终端 主芯片 22发来的硬件验证成功的通知后, 与 SIM卡模块 23比对所述定制 信息;在接收到移动终端主芯片 22发来的硬件验证失败的通知后,不与 SIM 卡模块 23比对所述定制信息, 阻止移动终端主芯片 22和 SIM卡模块 23 间的通信。
通过上述方案, 能够实现移动终端的灵活锁网, 并在定制信息为运营 商信息或运营商信息和合作方信息的情况下, 在同一运营商或同一运营商 和合作方所能提供服务的任何网络下, 移动终端只要插入该运营商定制的 SIM 卡后都能正常使用, 避免了移动终端在该运营商内部跨网络互调必须 返回生产厂商处重新锁网的问题, 提高了效率, 降低了成本。 同时, 釆用 软硬件结合的方法进行信息的互相比对, 可以有效地防止对移动终端软件 的各种非法破解。
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。

Claims

权利要求书
1、 一种移动终端锁网的方法, 移动终端内置加密芯片, 其特征在于, 在用户身份识别卡(SIM )、加密芯片和移动终端主芯片分别存储定制信息; 移动终端开机后, 所述加密芯片与移动终端主芯片和 SIM卡分别比对 所述定制信息, 在任意一次比对不一致后, 阻止所述移动终端主芯片和所 述 SIM卡间的通信。
2、 根据权利要求 1所述的方法, 其特征在于, 所述定制信息为运营商 信息、 或运营商信息和合作方信息。
3、 根据权利要求 2所述的方法, 其特征在于, 所述在 SIM卡存储定制 信息为: 当所述定制信息为运营商信息时, 在所述 SIM卡的分组识别文件 1 ( GID1 )写入运营商信息;
当所述定制信息为运营商信息和合作方信息时,在所述 SIM卡的 GID1 文件写入运营商信息, 在 SIM卡的分组识别文件 2 ( GID2 ) 写入合作方信 息。
4、 根据权利要求 2所述的方法, 其特征在于, 所述加密芯片和移动终 端主芯片比对所述定制信息为:
所述加密芯片发送信息获取信号到移动终端主芯片, 请求获取定制信 息;
所述移动终端主芯片在收到信息获取信号后, 将自身软件安全区域内 的定制信息发送到加密芯片;
所述加密芯片比对来自移动终端主芯片的定制信息和自身存储的定制 信息, 在不一致时, 阻止所述移动终端主芯片和所述 SIM卡间的通信。
5、 根据权利要求 4所述的方法, 其特征在于, 该方法进一步包括: 所 述加密芯片比对来自移动终端主芯片的定制信息和自身存储的定制信息, 在一致时, 向所述移动终端主芯片发送软件验证成功信号; 所述移动终端主芯片在接收到软件验证成功信号之后, 向加密芯片发 送信息获取信号, 请求获取加密芯片内的定制信息;
所述加密芯片在收到移动终端主芯片的信息获取信号后, 将存储的定 制信息发送到移动终端主芯片;
所述移动终端主芯片比对来自加密芯片的定制信息和自身软件安全区 域内的定制信息, 在一致时, 移动终端主芯片通知加密芯片硬件验证成功, 所述加密芯片接收到硬件验证成功的通知后, 执行加密芯片和 SIM卡比对 所述定制信息的步骤; 在不一致时, 通知加密芯片硬件验证失败, 所述加 密芯片接收到硬件验证失败的通知后, 阻止移动终端主芯片和 SIM卡间的 通信。
6、 根据权利要求 1至 5任一项所述的方法, 其特征在于, 所述加密芯 片和 SIM卡比对所述定制信息为:
所述移动终端在有 SIM卡插入时, 所述加密芯片向 SIM卡发送信息获 取信号, 请求获取 SIM卡内的定制信息;
所述 SIM卡在收到所述信息获取信号后 , 将自身存储的定制信息发送 到加密芯片;
所述加密芯片比对来自 SIM卡的定制信息和自身存储的定制信息, 在 不一致时, 阻止所述移动终端主芯片和所述 SIM卡间的通信。
7、 根据权利要求 6所述的方法, 其特征在于, 所述阻止所述移动终端 主芯片和所述 SIM卡间的通信, 为: 移动终端的加密芯片截获移动终端主 芯片和 SIM卡间的通信信息,中断移动终端主芯片和 SIM卡间的正常通信。
8、 一种移动终端, 其特征在于, 该移动终端包括: 加密芯片、 移动终 端主芯片、 SIM卡模块; 其中,
加密芯片, 其中存储有定制信息, 用于在移动终端开机后, 分别与移 动终端主芯片和 SIM卡模块比对定制信息, 在任意一次比对不一致后, 阻 止移动终端主芯片和 SIM卡模块间的通信;
移动终端主芯片, 其中存储有定制信息, 用于向加密芯片提供自身的 定制信息进行比对;
SIM卡模块, 用于读取 SIM卡中的定制信息, 并向加密芯片提供所述 定制信息。
9、 根据权利要求 8所述的移动终端, 其特征在于, 所述定制信息为运 营商信息或运营商信息和合作方信息。
10、 根据权利要求 9所述的移动终端, 其特征在于, 所述加密芯片, 具体用于在任意一次比对不一致后, 截获移动终端主芯片和 SIM卡模块间 的通信信息, 中断移动终端主芯片和 SIM卡模块间的正常通信。
PCT/CN2011/076012 2011-03-30 2011-06-21 一种移动终端及其锁网的方法 Ceased WO2012129851A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/985,577 US20140018131A1 (en) 2011-03-30 2011-06-21 Mobile terminal and network locking method therefor
EP11862010.3A EP2665300B1 (en) 2011-03-30 2011-06-21 Mobile terminal and network locking method therefor
JP2013553766A JP5722464B2 (ja) 2011-03-30 2011-06-21 モバイル端末及びそのネットワークロック方法

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110079065.6A CN102158846B (zh) 2011-03-30 2011-03-30 一种移动终端及其锁网的方法
CN201110079065.6 2011-03-30

Publications (1)

Publication Number Publication Date
WO2012129851A1 true WO2012129851A1 (zh) 2012-10-04

Family

ID=44439964

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/076012 Ceased WO2012129851A1 (zh) 2011-03-30 2011-06-21 一种移动终端及其锁网的方法

Country Status (5)

Country Link
US (1) US20140018131A1 (zh)
EP (1) EP2665300B1 (zh)
JP (1) JP5722464B2 (zh)
CN (1) CN102158846B (zh)
WO (1) WO2012129851A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242579A1 (zh) * 2018-06-21 2019-12-26 中兴通讯股份有限公司 移动终端的系统自适应方法、移动终端及存储介质

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102340768A (zh) * 2011-10-20 2012-02-01 中兴通讯股份有限公司 一种实现移动终端锁网的装置及方法
CN103200558B (zh) * 2012-01-05 2018-06-19 中兴通讯股份有限公司 一种机卡分离移动终端的锁网方法及机卡分离移动终端
CN104735647A (zh) * 2013-12-20 2015-06-24 中兴通讯股份有限公司 无线终端的锁网方法及系统
CN105130766A (zh) * 2015-09-10 2015-12-09 沈阳化工大学 利用一氧化碳气体(co)去除苯甲醚中微量水分的方法
CN105930749A (zh) * 2016-05-09 2016-09-07 广东欧珀移动通信有限公司 移动终端防盗处理方法及装置
KR102775185B1 (ko) * 2016-09-19 2025-03-04 삼성전자주식회사 서비스 이용을 개인화하는 사용자 기기 및 이의 동작 방법
US10993107B2 (en) 2019-03-01 2021-04-27 At&T Intellectual Property I, L.P. Multi-factor autonomous SIM lock

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018125A (zh) * 2007-03-02 2007-08-15 中兴通讯股份有限公司 一种基于椭圆曲线公钥密码的无线终端安全锁网锁卡方法
WO2010148778A1 (zh) * 2009-11-20 2010-12-29 中兴通讯股份有限公司 用于对移动终端加密的方法和加密芯片、以及一种移动终端

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2334411B (en) * 1998-02-12 2003-01-08 Nec Technologies Radio telephone hand set network restriction
GB2335568B (en) * 1998-03-18 2003-04-09 Nec Technologies Network operator controlled locking and unlocking mechanism for mobile phones
US20070094507A1 (en) * 2005-10-21 2007-04-26 Rush Frederick A Method and system for securing a wireless communication apparatus
CN101098540B (zh) * 2006-06-27 2012-05-23 国民技术股份有限公司 一种基于加密芯片的移动终端锁网方法
US20080003980A1 (en) * 2006-06-30 2008-01-03 Motorola, Inc. Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof
CN101155212A (zh) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 一种限制移动终端使用的方法
CN101873575A (zh) * 2009-04-24 2010-10-27 国民技术股份有限公司 带加密芯片的移动终端及其解锁/锁网方法
CN101977263B (zh) * 2010-10-12 2014-03-12 中兴通讯股份有限公司 一种对双卡移动终端进行加密的方法和移动终端
CN102131190A (zh) * 2011-03-31 2011-07-20 华为终端有限公司 一种移动终端加密的方法、硬件加密器件及移动终端

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018125A (zh) * 2007-03-02 2007-08-15 中兴通讯股份有限公司 一种基于椭圆曲线公钥密码的无线终端安全锁网锁卡方法
WO2010148778A1 (zh) * 2009-11-20 2010-12-29 中兴通讯股份有限公司 用于对移动终端加密的方法和加密芯片、以及一种移动终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019242579A1 (zh) * 2018-06-21 2019-12-26 中兴通讯股份有限公司 移动终端的系统自适应方法、移动终端及存储介质

Also Published As

Publication number Publication date
JP2014511052A (ja) 2014-05-01
EP2665300A1 (en) 2013-11-20
US20140018131A1 (en) 2014-01-16
EP2665300A4 (en) 2015-04-22
JP5722464B2 (ja) 2015-05-20
EP2665300B1 (en) 2016-10-26
CN102158846A (zh) 2011-08-17
CN102158846B (zh) 2015-04-01

Similar Documents

Publication Publication Date Title
WO2012129851A1 (zh) 一种移动终端及其锁网的方法
US8874077B2 (en) Method and apparatus for monitoring and theft prevention
US9055443B2 (en) Mobile device-type locking
US9143922B2 (en) Method and system for controlling communication between an UICC and an external application
EP2196045B1 (en) System and method for protecting data in wireless devices
CN101026834A (zh) 锁定方法和解锁方法
EP2677785A1 (en) Network locking method and device for mobile terminal
CN101521886A (zh) 一种对终端和电信智能卡进行认证的方法和设备
CN104205906A (zh) 网络辅助的欺诈检测装置与方法
CN103270782B (zh) 针对存储在移动通信终端中的敏感财务信息的安全容器的系统和方法
EP2368382B1 (en) Locking of communication device
CN107623907B (zh) eSIM卡锁网方法、终端及锁网认证服务器
CN102780989A (zh) 一种移动终端防丢失的方法及系统
CN101711023B (zh) 一种实现机卡互锁的方法及系统
CN102149074B (zh) 一种将终端与智能卡锁定或解锁的方法及装置
JP2012199751A (ja) 管理サーバ、通信システム、管理方法およびプログラム
CN102667806B (zh) 芯片卡、电子系统以及由芯片卡和计算机程序产品执行的方法
WO2012091647A1 (en) Tracking of missing communication devices
CN112469042B (zh) 一种对绑定的设备、模组、用户识别模块进行锁定的系统
CN105636043A (zh) eSIM卡鉴权方法、eSIM卡鉴权装置和终端
CN113747419B (zh) 一种空中下载方法和相关设备
CN104918244A (zh) 一种终端及终端通信方法
KR100641167B1 (ko) 이동통신단말기의 초기화 방법
CN103843378A (zh) 用于将安全装置绑定到无线电话的方法
WO2018047203A1 (en) A system and a method for locking a lost portable communication device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11862010

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2011862010

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2011862010

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2013553766

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 13985577

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE